Mail Forensics Toolhttps://mailforensics.wordpress.com
Forensic Investigation of EmailsThu, 07 Dec 2017 23:58:25 +0000enhourly1http://wordpress.com/https://s2.wp.com/i/buttonw-com.pngMail Forensics Toolhttps://mailforensics.wordpress.com
Export Office 365 Mailboxes to PST in an Capable Methodhttps://mailforensics.wordpress.com/2016/08/30/export-office-365-mailboxes-to-pst-in-an-capable-method/
https://mailforensics.wordpress.com/2016/08/30/export-office-365-mailboxes-to-pst-in-an-capable-method/#respondTue, 30 Aug 2016 07:17:15 +0000http://mailforensics.wordpress.com/?p=208]]>Though number of applications is provided online with the help of Office 365, most of the users find it difficult to work with the data controlled by external server. Inaccessibility of data associated with applications of Office 365 may tremendously hinder the organizational growth and will bring negative impact. To ensure that data are always available in local system, user can export Office 365 mailboxes to PST making it accessible in MS Outlook. As Outlook is a desktop-based client, the file is stored locally thereby increasing security.

Need to Export Office 365 Mailboxes to PST

As we know that Office 365 is a cloud-based service, many scenarios that can be considered related to the inaccessibility of Office data are:

How to Export Office 365 Mailboxes

Using eDiscovery Feature of Office 365

Office 365 supports an in-built feature i.e. eDiscovery that facilitates users with a search option for searching mailboxes in organization that looks for emails containing the keyword specified. Exchange In-Place eDiscovery can be used by administrator to conduct searches on folders like inbox, archived mailbox, tasks, etc. using EAC (Exchange Administrative Console). After searching, it will export the search results to a PST file.

Note: This method will only export the mails with particular keyword specified in e-Discovery and it is mainly used for investigation purpose.

]]>https://mailforensics.wordpress.com/2016/08/30/export-office-365-mailboxes-to-pst-in-an-capable-method/feed/0william1234jackoffice365-backupHow To Apply ACL Encryption in Lotus Notes and Add Users To Ithttps://mailforensics.wordpress.com/2016/06/27/how-to-apply-acl-encryption-in-lotus-notes-and-add-users-to-it/
https://mailforensics.wordpress.com/2016/06/27/how-to-apply-acl-encryption-in-lotus-notes-and-add-users-to-it/#respondMon, 27 Jun 2016 11:34:55 +0000http://mailforensics.wordpress.com/?p=183]]>Just like our lives, applications do follow a set of rules to make it work in a disciplinary manner. In IBM Lotus Notes, there is Access Control List (ACL) that specifies what actions can be performed by a group of users on a database when working with Domino Server. There are different means of acceptance or denial and we are going to discuss them all in the coming section of this segment.

The Access Levels in Notes®:

Lotus Notes gives the advantage of assigning level of access to the user. Below mentioned are the access levels that could be allotted to different users.

In the “User Type” section, there is option to define as to whom the rights should be assigned. To the Server, Person, or a group. Choose a relevant option between the available choices.

#1: Manager This will allow a user to modify the ACL permissions to the database, encrypt the DB, do changes in the replication settings, and execute all the operations that can be performed by users to lower level access. In addition to this, there is permission to delete the database. This can be generally assigned those two people who are responsible for managing the database.

#2: Designer The user with this right can modify the design elements in the database. This permission can be assigned to the one responsible for handling the database design updates.

3: Editor The Editor access will allows creating and editing the documents within the application. The user that has need to create or edit the documents can be permitted with this access control.

What is a Document? Individual records in Notes database is termed as documents. Access to these documents can be limited using the Access Control Levels that includes privileges for the user and roles performed by them.

Document Library: This is an organizer to documents that can be shared and viewed by a group of people. It allows adding, reviewing, and reading the documents in the library.

#4: Author The author has right to create and edit the document but he can only edit the documents that has been created by him. By default when this right is selected, the permission to create documents will not be provided. It has to be enabled manually as per requirement.

#5: Reader The reader has permission only to read the document.

6: Depositor A depositor is allowed to add document. This access control level is used generallt in applications that are designed for special purposes like voting. For example: If an employee receives a form, he fills, and submit it. In this case, he cannot read the information shared by him once submitted and shared by anyone else.

Note: A Lotus Notes application is similar to MS Access Database like we compare Lotus Notes Mail to Gmail. An application is a file with extension .nsf. The applications are stored in the data directory at a default location that can be changed as per requirement. The applications are stored on server (in most of the cases) ad hence they are called as client-server software.

#7: No Access If a user, server, or a group have No Access, they can only read and write public documents, only when it is enabled by the manager.

The ACLs can only be applied on the server database and does not work locally. If changes are made to the local database and they are tried to be replicated to the server database, the changes will be done considering the access level that the ACL settings grant. For example: The Reader do not have permission to create a document. If a reader creates a new document locally and replicates it on server, he/she would fail to do so.

How to Add a User to Access Control List:

#1. Open Notes database. Click on the “File” menu, drop down to “Application” and choose “Access Control”.

#2. Click on “Basics” and choose “Add”

#3. Define the user, server, or the group of users to whom the permission should be granted. Click OK. You can also use the user icon to choose a name from Notes address book.

#4. Now, use the drop down menu to define an access level to the user.

]]>https://mailforensics.wordpress.com/2016/06/27/how-to-apply-acl-encryption-in-lotus-notes-and-add-users-to-it/feed/0william1234jacknsf1nsf2nsf3nsf4nsf5nsf6nsf71nsf8nsf9nsf10nsf11nsf12nsf13nsf14How to Reset & Remove CorelDraw GMS Password..???https://mailforensics.wordpress.com/2016/05/27/how-to-reset-remove-coreldraw-gms-password/
https://mailforensics.wordpress.com/2016/05/27/how-to-reset-remove-coreldraw-gms-password/#respondFri, 27 May 2016 08:38:50 +0000http://mailforensics.wordpress.com/?p=172]]>CorelDraw was the first graphic design suite for Windows Operating system that provides tools and options to help users in creating several projects. It is used for designing complex drawings, logo design, cover pages, photo editing, web graphics design, etc. GMS Files are the data files primarily associated with CorelDraw, which is usually password protected to avoid misuse. The article will be discussing about the issues related to the misplaced or forgotten password and solution to reset the password to make the GMS file accessible again.

Necessity to Reset Password Protection

A GMS is a file extension used for storing macros within it, where Macro is a chain of instructions that can be stored & recalled with a single command or keystroke to automate the task. Most of the organizations that use CorelDraw GMS files need to keep their files secured keeping it protected with password to avoid unauthorized access. However, in some cases password applied on the file may be lost or forgotten making the file inaccessible. Hence, we need a tool that can reset the password of GMS file, which is possible with the help of a reliable Tool to easily Reset CorelDraw GMS Password successfully without any difficulty.

Approach to reset the password of GMS Files

The inbuilt feature of the software allows users to reset multi-lingual CorelDraw file password containing digits, alphabets, symbols, or combination. CorelDraw GMS password Remover can be installed and executed on any system with Windows Operating System as it supports almost all the versions of Windows. The tool helps users in easily resetting password of GMS files, which was restricted due to unavailability of password.

]]>https://mailforensics.wordpress.com/2016/05/27/how-to-reset-remove-coreldraw-gms-password/feed/0william1234jackcoreldraw-gms-password-removerOLM to Outlook 2016 Conversion – WHY, WHEN & HOW?https://mailforensics.wordpress.com/2016/02/02/olm-to-outlook-2016-conversion/
https://mailforensics.wordpress.com/2016/02/02/olm-to-outlook-2016-conversion/#respondTue, 02 Feb 2016 07:25:47 +0000http://mailforensics.wordpress.com/?p=157]]>An Intro of Mac Outlook: If you are a Mac user and want to connect your PC-based- emails to the Mac inbox then, Mac Outlook will be your official partner. Microsoft, the industry giant for software production offered a range of Outlook editions for Windows users and Mac Outlook is the only one edition that works to consolidate entire email data along with contacts, calendars, etc to unify the data of your home PC to Office Mac PC.

A range of facilities with Outlook 2011 made it worthy for Mac users; get a look of its features:

Long e-mail threads keeps your mailbox clean as you can keep various emails under a single subject

Within the email you can view the calendar entry and it is not only to see the meeting details from a single calendar, you can checkout a overlay of calendars

If you do have cloud of emails in PST then you can add up the Outlook Windows stuff into Mac Outlook

To unify emails from your workplace to the Office streamlining of messages at one place is possible

In a single look you can keep an eye on the entire schedule of the day no matter you are using phone or computer

Using this email client with any OS like Mac OS or Windows 7 is also possible for previewing Mac data into other OS

Outlook 2016 – New Edition of MS Outlook

As we have discussed Microsoft provided various editions of MS Outlook for users’ ease. The most recent variation of Outlook for Windows is Outlook 2016, this version is packed up with multiple amenities those were not available with old MS Outlook.

Setting up Outlook 2016 with or without Exchange is quite easy for which user need to add up the email account to POP3 or IMAP4 protocol. To do this you should have proper settings for POP3 or IMAP4.

Apart from easy installation and easy usage this email client has a great collection of features elaborated here:

Listing of messages

Added commands for quick actions

Preview of contacts at one place

Updated whether details

Adding up a new account with simple click option

Adding new message with shortcut keys

Quick forward or reply for a message using inline method

Multiple attachment addition

And many more features over there due to which MS Outlook 2016 is became a frequently used email application.

Why & When OLM to PST Outlook Conversion?

There are various causes due to which Outlook Mac is failed to fulfill requirements of users as well as it is tough to work with. The foremost reason to leave Outlook Mac is its technicalities those are not adoptable over a set of computer users worldwide.

Moreover, OLM file does not exist actually because emails of Mac systems get saved into different folder and other information into some other folder that further exported into OLM format. On the other hand, PST file is proprietary file format of Windows OS Outlook that can easily access into any edition of Outlook Windows involving Outlook 2016. Outlook 2016 is the latest edition of the email client so; users want to opt this while leaving Mac Outlook.

How to Convert OLM to Outlook 2016 Commercially?

Outlook Mac Exporter is the technically integrated software for data export from OLM to Outlook 2016 without single bit data alteration. As well as this tool will let you make Conversion from OLM to PST at your Windows computer.

PST file got corrupted by Computer Device failure: Corruption of hard disk or other storage area where PST file was stored, so the possibility of Outlook and PST file corruption.

Networking Device problem: ex: if you exchange your PST file over the internet and the problem occurred on routers, cable, interface cards, etc and the connection suddenly terminated, it is also the reason of PST file corruption.

Power issues: You are working with your PST file and suddenly system get shutdown (dirty shutdown) that is one of the reasons of PST file corruption.

Virus infection: If a virus attack on your computer, Virus can corrupt your PST file or your computer storage area where PST file is stored. Normally PST file stored on computer hard drive. If you want do not face this type of problem, install a quality antivirus.

Sudden termination of outlook: Normally user saves all changes of the PST file and properly quit Outlook. But, sometime user does not follow the proper shutdown procedure of Outlook and Computer, it is one of the causes of PST file corruption.

These are the main cause of PST file corruption. You are trying to open PST file, but it is not possible to open a PST file. In this situation, you can use two methods for recovering corrupt PST file. First – Manually and Second – Third party software like PST Recovery tool. If you want to repair corrupt PST file by manually, hence Microsoft Outlook provides Scan.exe tool to repair PST. The default location of scan.exe file is- “C:\Program Files\Microsoft Office\Office12”. The manual solution is not effective if your PST file highly corrupted. And other hand third party software effective in the highly corrupted PST file issue, and easily recover PST file data.

After scanning process completed tool display scan report and provides two button Detail, and Repair. If you press the Detail button tool display more information about corruption. If you press the Repair button, then tool starts the actual repair process.

Disadvantages of Scanpst.exe

Why Third Party PST Recovery Tool is perfect solution of corrupt Outlook file

The third party recovery tool provides an effective way to recover corrupt PST file and repair corrupt PST items. The PST recovery software originally designed to recover permanently deleted PST file data and solve corruption issues of PST files. The third party tool, not only recover corrupt PST files, but also recover the password protected corrupt PST files & recovers multiple corrupt PST files. The PST Recovery tool is more effective and reliable in the recovery process and users easily working with the software because the tool provides perfect design according to users.

Conclusion

The ScanPST.exe file is perfect for minor corruption issues, if PST file is highly corrupted then third party software is perfect to recover corrupt file without losing of important data, so I recommended third party software like PST Recovery Tool.

]]>https://mailforensics.wordpress.com/2015/11/17/pst-recovery/feed/0william1234jackOutlookedb-converter-downloadedb-recover-buyExport Lotus Notes to Outlook Tool Available With Date Based Filtershttps://mailforensics.wordpress.com/2015/06/11/export-lotus-notes-to-outlook-tool-available-with-date-based-filters/
https://mailforensics.wordpress.com/2015/06/11/export-lotus-notes-to-outlook-tool-available-with-date-based-filters/#respondThu, 11 Jun 2015 06:38:32 +0000http://mailforensics.wordpress.com/?p=115]]>One of the leading names in email database converter arena hereby updates users about date based filter options added into export lotus notes to outlook tool. The software that works on username.nsf, names.nsf, and notebook.nsf file works on Windows Operating System and is compatible with all version of Notes database. While all items are filtered on the basis of date range, contacts are separated out by removing duplicates on the basis of varied fields in the address.

At an enterprise level, migration requirement vary to different extends. This is the reason why we try to embed qualitative change in our tools time to time with active research so that our users get only the best. In Convert NSF to PST, the facility of filtering mailbox items by date range is integrated that allows users to exclude unwanted data and speed up the migration process.”

“Migration is one of the complicated and risky task that enterprises perform. Usually, employees have data of years and while migration not all the mails, calendars, or other items are important. With export Lotus Notes to Outlook tool, we have ensured that a solution to the users is rendered that allows moving only the data that is needed. To testify the quality of Export Notes product, we always suggest our users to download free demo version of the tool that gives platform for limited conversion. For any interrogation related to product or functionality, the support team is available for help 24/7 and that too free of cost.”

]]>https://mailforensics.wordpress.com/2015/06/11/export-lotus-notes-to-outlook-tool-available-with-date-based-filters/feed/0william1234jacknsf-to-pstProtocol Unleashed to Import MBOX to PST File for Extended Accessibility!https://mailforensics.wordpress.com/2015/06/10/protocol-unleashed-to-import-mbox-to-pst-file-for-extended-accessibility/
https://mailforensics.wordpress.com/2015/06/10/protocol-unleashed-to-import-mbox-to-pst-file-for-extended-accessibility/#respondWed, 10 Jun 2015 12:00:33 +0000http://mailforensics.wordpress.com/?p=108]]>Company takes initiative to inform users of reforming a technology for accessing emails belonging to a wide range of email clients including Mozilla Thunderbird, QualcommEudora, etc. in Microsoft Outlook email client. This protocol comes in the form of software application which deploys conversion of email data from MBOX file to PST file with unique set of features embedded in it. It has been reported that this technology has been rejuvenated with enhancements in the conversion procedure and other attributes helping to Convert MBOX to PST file. This enhancement has recently helped many users to attain maximum benefits out of this application and consumers are satisfied with the output achieved using the tool.

Import MBOX to PST software has an extended support towards MBOX files belonging to various email clients like; Spice Bird, Netscape, Mac Mail, Entourage, The Bat, Sea Monkey, Thunderbird, etc. The range extends to all email clients which support MBOX file and save emails in MBOX file format in distinctive variants of this file format. All the Metadata, attachments, and other properties of MBOX emails are retained after conversion. The application was recently integrated with multiple functions like auto-detection of MBOX files from the system, support towards Windows 64 bit version, HTML report generation, etc. The procedure to import MBOX to PST file is improved in many aspects with this tool.

Process of MBOX to PST Conversion

The MBOX to PST conversion process is done keeping the properties of the MBOX files intact. We have analyzed both MBOX and PST file formats deeply and then we came up with this conversion mechanism. The MBOX to PST Conversion software has many helpful features like it allows exporting multiple MBOX files to same PST or create separate PST file for separate folder which help to import MBOX to PST in more organized manner. The application is an advance technology and we hope that multiple users are satisfied with the product.”

Do you need to go overboard with something new, quirky and unconventional?

Are you tired of trying the conventional methods of recovery but always in vain?

Then here is your chance to pick the best basket of benefits with a tool that can Convert OST file to PST with a lightning fast speed and with perfection you can never ever imagine to get elsewhere with manual tools and other traditionally tried methods. From email items recovery and quick conversion to virus-free progression, this tool is all about being perfect and fabulous to the extent that you cannot ask for more once you deploy it on your machine to move OST file. And those users who show no inhibition towards using a third-party tool to meet their recovery needs are the ones who rule the businesses as there is no downtime for them to stop their business deeds and actions. Experimenting with new things is a trait of winners and those who have experimented with the use of third-party tools, especially the one that we provide, are more than happy with their decision and came out as winners from the problem situation, of OST file corruption.

Tool Trends

Other tools – some are popular while others are not able to make a mark
Our tool – always in the list of topmost tools We have got an amazing and overwhelming response from all our customers. Be the special one to get benefited from the tool. The Convert OST to PST tool effectively converts the OST files to PST files as a recovery of the lost data of Microsoft Outlook from Exchange mailbox. This is undoubtedly one of easiest and best conversion tools which easily recover data from corrupted Exchange OST files.

About OST and PST files

OST File – The OST file (Offline Storage File) of is the one stored at client end in the system. The file is formed through Microsoft Outlook/Exchange email environment created by the user. A copy of the exchange mail data during use is created in the OST file. Through this, the users can easily work in offline mode in the email environment. During that interaction, significant tools like personal folders, offline tasks, contacts and any mails are thereby exchanged. As a result of this, the changes in stock get updated on the server on connection restoration.

PST File – The PST File (Personal Storage File) refers to the personal storage table file which includes mailbox items present in the Microsoft Outlook mailbox. The location of both OST file and PST file are same. When a user uses Outlook in the standalone application mode, PST files are created.

Reasons behind Inaccessibility of Data The OST files can be easily accessed only during a connection between the files and the Exchange Server. The OST file includes all the mailbox data copy and cannot be accessed in times of limited connection. However, in some cases during the availability of connection, users fail to access OST files. This is because of a corruption or when the directory service is inaccessible. In this case, the OST files cannot be accessed even from the Microsoft Outlook application. During this time, the use of a good third-party tool is recommended. OST Recovery software is a prime and most used tools used for converting inaccessible OST files into accessible PST files effectively. The OST to PST Converter software easily converts files as a result of which is a highly recommended tool for recovering or accessing valuable data.

]]>https://mailforensics.wordpress.com/2015/06/10/convert-ost-to-pst-easily-recover-email-message-instantaneously/feed/0william1234jackost-to-pst-conversionDiscover Complete Migration Of Lotus Notes to Outlook Format Usinghttps://mailforensics.wordpress.com/2015/04/03/lotus-notes-database-to-pst-format/
https://mailforensics.wordpress.com/2015/04/03/lotus-notes-database-to-pst-format/#respondFri, 03 Apr 2015 09:40:19 +0000http://mailforensics.wordpress.com/?p=72]]>This bulletin has been published by a renowned Company to notify its users about the advance features of Lotus Notes to Outlook converter tool which has uplifted it into the glare of publicity. It is an exceptional solution that permits users to perform both client to client as well as client to Server migration. When it comes about client to client migration, the tool acquires the limelight.

Complete migration of Lotus Notes database into PST format can be done by the tool. It has the caliber to convert complete data of NSF files like emails, contacts, calendars etc into PST format. Moreover at the time of conversion, export Lotus Notes to Outlook toolguarantees to keep the Meta data of NSF files intact so that the users do not get confused after the conversion. The tool performs the conversion of emails from NSF to PST format along with the attachments.

Director of Product Development Department, Alvin Foster says: “In this digital era, everyone looks for an advanced solution in order to resolve a particular issue. Lotus Notes to Outlook converter is a complete solution for the migration of Lotus Notes database into Outlook. The tool has been appreciated by a large number of people which reflects that the hard labor of our team has not gone in vain.”

Gilbert Reed, the Director of the Company stated: “A large number of email clients are available in this digital world for the convenience of the people. Hence, it has been a common practice to migrate from one platform to another according to the requirement of the people. For the conversion, a suitable tool is selected that can provide desired output. We are into the market since a long time and clearly understand the requirements of the people. NSF to PST converter designed by our team proves to be heart and soul solution for the migration of Lotus Notes database into PST format.”

Felix Hicks, the Head of support department added: “Due to strong disaster recovery plan of Outlook, a large number of users migrate from Lotus Notes to Outlook. Many of the uses had appreciated us for the efficient functioning of export Lotus Notes to Outlook tool. The most significant feature which they found in our tool is the conversion of emails along with attachments. The advance algorithm of the software allows the users to convert emails of Lotus Notes to Outlook with attachments like images, documents etc. The tool is designed keeping the people first; however, if there are any technical issues with the working of the tool, our team is always ready to render valuable solutions in order to overcome their queries.”

In case any thorough information is required about Lotus Notes to Outlook converter, you can drop your queries to the support department. Your queries will be welcomed by the experts and effective solutions will be provided to you in order to overcome from the situation.

]]>https://mailforensics.wordpress.com/2015/04/03/lotus-notes-database-to-pst-format/feed/0william1234jacknsf-to-pstPerspective of Office 365 Forensic Software And Analysis!https://mailforensics.wordpress.com/2014/12/24/office-365-forensic-software-and-analysis/
https://mailforensics.wordpress.com/2014/12/24/office-365-forensic-software-and-analysis/#respondWed, 24 Dec 2014 10:00:20 +0000http://mailforensics.wordpress.com/?p=48]]>Office 365 at corporate level has the most confidential and sensitive data storage records and thus is targeted as the most critical store for investigation. Its mail contents, user contacts, other data files, artifacts allied to emails, etc. have to be analyzed using reliable Office 365 forensic software. The investigation generally hovers around the records with suspicious details and un-authorized access and information leakage.

Conditions Deterring Investigation

It is important to investigate Office 365 data logs so that estimation can be made as per the logs obtained. “Audit” which can be defined as a record with details who has accessed the account (mailbox) along with timestamp and actions performed on it. These Audit trails are highly useful to maintain security and gather information for investigation. However, when it comes to Office 365, auditing is not enabled for all the mailboxes by default. One has to enable it and only then Audits will be available. This means that if user mailbox is disabled Audits these data sources will not be available;

Authentication logs

Client connection details

Message tracking data

OWA webserver logs

Last user log-in details

Thus, if events are not logged details have to be gathered from Microsoft Support. But MS Support can also deliver very limited amount of details. And in such scenarios Office 365 forensic software can be a wise prop to endure the investigation.

If the Audit is enabled, Audits will be available in the Target mailbox. This means if user A tries to access user B’s mailbox, the record of this access is stored in mailbox B in the folder name Audits under “Recoverable Items”. Irony is deletion of mailbox also deletes Audit data. To view this Audit Trails, Web Console or PowerShell can be used. PowerShell is preferable using “search-mailboxauditlog”.

What Indicates Office 365 Was Involved?

At receiver’s end it is difficult to conclude whether the email you are studying was sent using Office 365 or not.

“MX” records can provide general estimation but it is not always correct. For instance, Microsoft MX can also relate to FrontBridge anti-spam and not to Office 365.

For more accurate results one can go for SPF records. Query for “TXT” record and view “include: spf.protection.outlook.com”

“Autodiscover” is a kind of “CNAME” which points to autodiscover.outlook.com is also a better indicator.

Further, an “NS” record for “ORGNAME.onmicrosoft.com” points to the fact that Office 365 service has been involved.

How to Trace Office 365 Email Data?

In case you are examining a dead system, you can start from searching file names ending “Autodiscover.xml”. To be precise, search it in Outlook’s local appdata folder into Mailbox details, Server details and additional mailboxes to which user is having access. In case investigation has to be made on Office 365 emails, you can perform detailed investigation in headers of Office 365 emails. IP address can be traced from “x-originating-IP” element. You must also be aware of the fact that Office 365 supports SPF well but it does not support DKIM.

Bottom Line:

This blog highlights some of the basic methods used for such investigations. Email headers, Audit trails are the vast resource for evidences but for detailed and bulk email analysis Office 365 forensic software like are used by professional investigators. It must be noted that to gather information from Audits, it must be enabled. Moreover, there are many other modes available for investigation of Office 365 application like Microsoft’s document-level DRM solution.